[1]ATENIESE G, BURNS R, CURTMOLA R, et al.Provable data possession at untrusted stores [C]// CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007: 598-609.
[2]ATENIESE G, KAMARA S, KATZ J, et al.Proofs of storage from homomorphic identification protocols [C]// ASIACRYPT 2009: Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, LNCS 5912. Berlin: Springer-Verlag, 2009: 319-333.
[3]ATENIESE G, PIETRO R D, MANCINI L V. Scalable and efficient provable data possession [C]// ICAR 2008: Proceedings of the 4th International Conference on Security and Privacy in Communication Networks. New York: ACM, 2008:22-25.
[4]CURTMOLA R, KHAN O, BURNS R C, et al.MR-PDP: Multiple-replica provable data possession [C]// ICDCS 2008: Proceedings of the 28th International Conference on Distributed Computing Systems. Washington, DC: IEEE Computer Society, 2008: 411-420.
[5]ERWAY C, KUPCU A, PAPAMANTHOU C, et al.Dynamic provable data possession [C]// IACR 2008: Proceedings of the 16th ACM conference on Computer and Communications Security. New York: ACM, 213-222.
[6]WANG Q, WANG C, REN K, et al.Enabling public auditability and data dynamics for storage security in cloud computing [J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(5): 847-859.
[7]CHEN L. A homomorphic hashing based provable data possession [J]. Journal of Electronics & Information Technology, 2011, 33(9): 2199-2204. (陈兰香.一种基于同态Hash 的数据持有性证明方法[J].电子与信息学报,2011,33(9):2199-2204.)
[8]CHEN L. Using algebraic signatures for remote data possession checking [C]// CDCKD 2011: Cyber-Proceedings of the 2011 International Conference on Enabled Distributed Computing and Knowledge Discovery. Piscataway: IEEE, 2011: 289-294.
[9]CHEN L. Using algebraic signatures to check data possession in cloud storage [J]. Future Generation Computer Systems, 2012, 29(7): 1709-1715.
[10]CHEN L, GUO G. An efficient data possession checking in cloud storage [J].International Journal of Digital Content Technology and its Applications, 2011, 5(4): 43-50.
[11]CHEN L, GUO G, PENG Z. A hill cipher-based remote data possession checking in cloud storage [J]. Security and Communication Networks, 2014, 7(3): 511- 518.
[12]JUELS A, KALISKI B. PORs: Proofs of retrievability for large files [C]// CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security. New York: ACM, 2007: 584-597.
[13]SHACHAM H, WATERS B. Compact proofs of retrievability[C]// ASIACRYPT 2008: Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer-Verlag, 2008:90-107.
[14]DODIS Y, VADHAN S, WICHS D. Proofs of retrievability via hardness amplification [C]// TCC 2009: Proceedings of the 6th Theory of Cryptography Conference, LNCS 5444. Berlin: Springer-Verlag, 2009: 109-127.
[15]BOWERS K D, JUELS A, OPREA A. Proofs of retrievability: theory and implementation [C]// CCSW 2009: Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York: ACM, 2009:43-54.
[16]CURTMOLA R, KHAN O, BURNS R. Robust remote data checking [C]// STORAGESS 2008: Proceedings of the 4th ACM International Workshop on Storage Security and Survivability. New York: ACM, 2008: 63-68.
[17]REED I S, SOLOMON G. Polynomial codes over certain finite fields [J]. Journal of the Society for Industrial and Applied Mathematics, 1960, 8(2): 300-304.
[18]SARKAR S, SAFAVI-NAINI R. Proofs of retrievability via fountain code [C]// FPS 2012: Proceedings of the 5th International Conference on Foundations and Practice of Security, LNCS 7743. Berlin: Springer-Verlag, 2013: 18-32.
[19]MacKAY D J C. Fountain codes [J]. IEE Proceedings — Communication, 2005, 152(6): 1062-1068.
[20]LUBY M. LT codes [C]// SFCS 2002: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science. Piscataway: IEEE, 2002:271-280.
[21]SHOKROLLAHI A. Raptor codes [J]. IEEE Transactions on Information Theory, 2006, 52(6): 2551-2567.
[22]DIMAKIS A G, PRABHAKARAN V, RAMCHANDRAN K. Ubiquitous access to distributed data in large-scale sensor networks through decentralized erasure codes [C]// IPSN 2005: Proceeding of the 4th International Symposium on Information Processing in Sensor Networks. Piscataway: IEEE, 2005: 111-117.
[23]BUTTYN L, CZAP L, VAJDA I. Detection and recovery from pollution attacks in coding-based distributed storage schemes [J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(6):824-838.
[24]PENG Z, CHEN L, GUO G. A method of fountain code based privacy protection and data recovery [J]. Journal of Huazhong University of Science and Technology: Natural Science Edition, 2012,40(S1):54-57.(彭真,陈兰香,郭躬德.基于喷泉码的隐私保护和数据恢复方法[J].华中科技大学学报:自然科学版,2012,40(S1):54-57.) |